Securing apps has never been easy, and in today’s world of remote work, it has become increasingly difficult. Employees can work from anywhere, and they do, often connecting to corporate resources ...
API security risk has dramatically evolved in the last two years. Jason Kent, Hacker-in-Residence at Cequence Security, discusses the top API security concerns today and how to address them. As a long ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Jinsong Yu shares deep architectural insights ...
The Open Web Application Security Project (OWASP) has published a new version of its infamous Top 10 vulnerability ranking, four years after its last update, in 2013. The OWASP Top 10 is not an ...
According to a report released by Akamai earlier this year, API calls now represent 83% of all web traffic. Web-enabled applications already have 40% of their attack surface in the form of APIs ...
In an increasingly interconnected digital world, web applications are the backbone of online services. With this ubiquity comes a significant risk: web applications are prime targets for cyberattacks.
Nonprofit foundation Open Web Application Security Project (OWASP) has released an updated draft of its ranking of the top 10 vulnerabilities, the first changes to the list since November 2017. The ...
Despite the increased focus on application security in the last few years, cyber-threats are increasing in volume, sophistication and impact. To help companies defend against them, OWASP, a non-profit ...
The new OWASP Top 10 list is out, and while most of it remains the same, there are new additions focusing on web applications and APIs The new release of the OWASP Top 10 list is out for public ...
The OWASP Foundation has disclosed a data breach after some members' resumes were exposed online due to a misconfiguration of its old Wiki web server. Short for Open Worldwide Application Security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results